Threat Research
Stay on top of the latest threat research, information on in-the-wild cyber attacks and cyber operations from Juniper Threat Labs.
Juniper Employee , Juniper Employee Juniper Employee
Threat Research
Shamoon Returns
Dec 14, 2016

Over the past month, we've seen a reemergence of the Shamoon malware, primarily affecting businesses in Saudi Arabia. In this post, we'll take a look at a recent Shamoon sample to see how it works and how Sky ATP's deep analysis engines catch it.

 

The Hidden Payload 

We start by observing that Shamoon has three bitmap images stored as resources within its executable file.

 

resourcehacker.png

 

All three bitmaps look random(ish). A file that appears truly random could be the result of a strong encryption, perhaps a block cipher like AES or a stream cipher with a long, non-repeating key. However, when we look closer, we see what appear to be some patterns in the data:

 

bitmap_pattern.png

 

The partial repetitions suggest a stream cipher with a short encryption key, causing a pattern to emerge over sections of the underlying plaintext that are fairly constant (often all 0's). From this we can deduce the key length from the pattern's period and perhaps (if there are exact repetitions of the entire pattern) recover the entire key. However, we need not bother with cryptanalysis; in this case, we can let the malware do the heavy lifting for us. In the disassembled binary, we find the following:

 

xor_disassembly.png 

The first block of code finds where the bitmap resources have been loaded into memory. The second part, beginning at the  loc_401A10 label, is a loop containing a simple xor stream cipher. Using a debugger, we can extract both the keys and the decrypted contents, which turn out to be executable files carrying the payload of this attack.

 

Persistence and Evasion

On first launch, Shamoon runs but immediately quits, never reaching the decryption code above. Instead, Shamoon has quietly installed itself as a persistent service.

 

registry.png

 

Here we see that the program is relaunched automatically in the background as the "Microsoft Network Realtime Inspection Service," with the command-line parameter "LocalService". After sleeping for several minutes to avoid detection, it decrypts two of the bitmaps above and writes the decoded executable files to disk.  One of these is netinit.exe, a remnant of the previous Shamoon campaign. While this was originally the component that communicated with a command-and-control server, in the current incarnation it only communicates with 1.1.1.1, which serves as a harmless placeholder. The other binary is written to a Windows system directory with a name randomly chosen from a set of names mimicking Windows system files: fsutl.exe, sigver.exe, sacses.exe, etc.

 

Data Destruction

Launching these two dropped files begins the real attack. Contained within the second executable is the EldoS RawDisk library, a legitimate piece of software that allows direct low-level access to the hard drives. On 32-bit Windows XP, the master boot record is overwritten, leaving the system inoperable. On 64-bit Windows 7, the master boot record isn't damaged, but the media files on the computer are overwritten with the image of the body of a Syrian boy -- obscured in the screenshot below -- suggesting possible political motivations for the attack.

 

pictures.png

 

After this, the computer is rebooted automatically, and upon reboot all media files have been erased. 

 

Detection

Though rules/hash-based antivirus engines initially missed the updated Shamoon variants, Sky ATP successfully detects and blocks Shamoon. The static analysis and dynamic analysis (sandboxing) stages of our deep analysis pipeline extract a number of useful features from both the executable file and its runtime behavior, based on which Sky ATP's machine learning engine correctly classifies Shamoon as malicious.

 

skyatp_results.png

 

 

 

 

Top Kudoed Members